会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明专利
    • Information processor and information processing method
    • 信息处理器和信息处理方法
    • JP2013092960A
    • 2013-05-16
    • JP2011235708
    • 2011-10-27
    • Ntt Electornics CorpNttエレクトロニクス株式会社
    • HOSODA YASUHIROWATANABE NOBUHIKO
    • G06F21/62G06F21/86G09C1/00H04L9/08
    • PROBLEM TO BE SOLVED: To use a cryptographic device to execute encryption and decryption without rewriting an application program.SOLUTION: A CPU 2 includes an OS 6 and an application program 7. An HDD 3 and an anti-tampering cryptographic device 4 are connected to the CPU 2 through an internal bus 4. The OS 6 includes: an HDD access routine 10 for executing read/write to the HDD 3; a preparation processing part 12 for putting the cryptographic device 4 into a preparation completion state; and an encryption/decryption processing part 13 for causing the cryptographic device 4 in the preparation completion state to execute encryption or decryption. When the application program 7 issues a writing instruction, the HDD access routine 10 sends plaintext data to the encryption/decryption processing part 13, the encryption/decryption processing part 13 causes the cryptographic device 4 to encrypt the plaintext data and obtains encrypted data, and the HDD access routine 10 writes the encrypted data into the HDD 3.
    • 要解决的问题:使用加密设备执行加密和解密而不重写应用程序。 解决方案:CPU 2包括OS 6和应用程序7. HDD 3和防篡改密码装置4通过内部总线4连接到CPU 2.OS 6包括:HDD访问例程 10,用于执行对HDD 3的读/写; 准备处理部12,用于将密码装置4置于准备完成状态; 以及用于使处于准备完成状态的密码装置4执行加密或解密的加密/解密处理部分13。 当应用程序7发出写入指令时,HDD访问例程10向加密/解密处理部分13发送明文数据,加密/解密处理部分13使密码装置4加密明文数据并获得加密数据, HDD访问例程10将加密数据写入HDD 3.版权所有:(C)2013,JPO&INPIT
    • 3. 发明专利
    • Information processing system and information processing method
    • 信息处理系统和信息处理方法
    • JP2013157777A
    • 2013-08-15
    • JP2012016365
    • 2012-01-30
    • Ntt Electornics CorpNttエレクトロニクス株式会社
    • HOSODA YASUHIROOSUGA KATSUMIKAWAKAMI KOJIKUMAZAWA YOSHIHIRO
    • H04L9/32G09C1/00
    • PROBLEM TO BE SOLVED: To provide a system and method in which alteration of data and authenticity of a transmission source can be verified.SOLUTION: A data generation part 4 of a sender side device 1 generates data D, a secret information generation part 5 generates secret information S1. A data processing part 6 adds the secret information S1 to the data D immediately after the generation to convert the secret information S1 into a hash value H1 with a hash function. A key generation storage part 7 generates a pair of a secret key and a public key. An encryption part 8 encrypts the hash value H1 with the secret key to acquire a signature value S. An output part 9 outputs the data D and the signature value S, and an input part 10 of a receiver side device 2 inputs them. A secret information generation part 11 generates same secret information S2 as the secret information S1. A data processing part 12 converts data in which the secret information S2 is added to the data D into a hash value H2 with the hash function. A decryption part 13 decrypts the signature value S with the public key to acquire a hash value H3. A verification part 14 verifies whether or not the hash value H2 and the hash value H3 are the same.
    • 要解决的问题:提供可以验证发送源的数据和真实性的改变的系统和方法。解决方案:发送方侧设备1的数据生成部分4生成数据D,秘密信息生成部分5生成 秘密信息S1。 数据处理部分6将秘密信息S1添加到生成之后的数据D上,以将散列函数转换成散列值H1的秘密信息S1。 密钥生成存储部7生成一对秘密密钥和公开密钥。 加密部分8用秘密密钥加密哈希值H1以获取签名值S.输出部分9输出数据D和签名值S,并且接收机侧装置2的输入部分10输入它们。 秘密信息生成部11生成与秘密信息S1相同的秘密信息S2。 数据处理部分12将其中添加了秘密信息S2的数据转换成具有散列函数的散列值H2。 解密部13利用公开密钥对签名值S进行解密,得到哈希值H3。 验证部分14验证散列值H2和散列值H3是否相同。